CVE-2024-54458

In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: bsg: Set bsg_queue to NULL after removal Currently, this does not cause any issues, but I believe it is necessary to set bsg_queue to NULL after removing it to prevent potential use-after-free (UAF) access.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

02 May 2025, 07:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/22018622e1e9e371198dbd983af946a844d5924c -
  • () https://git.kernel.org/stable/c/bb4783c670180b922267222408e1c48d22dfbb46 -

24 Mar 2025, 18:24

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: ufs: bsg: Establecer bsg_queue en NULL después de la eliminación Actualmente, esto no causa ningún problema, pero creo que es necesario establecer bsg_queue en NULL después de eliminarlo para evitar un posible acceso de use after free (UAF).
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/1e95c798d8a7f70965f0f88d4657b682ff0ec75f - () https://git.kernel.org/stable/c/1e95c798d8a7f70965f0f88d4657b682ff0ec75f - Patch
References () https://git.kernel.org/stable/c/5e7b6e44468c3242c21c2a8656d009fb3eb50a73 - () https://git.kernel.org/stable/c/5e7b6e44468c3242c21c2a8656d009fb3eb50a73 - Patch
References () https://git.kernel.org/stable/c/5f782d4741bf558def60df192b858b0efc6a5f0a - () https://git.kernel.org/stable/c/5f782d4741bf558def60df192b858b0efc6a5f0a - Patch
References () https://git.kernel.org/stable/c/88a01e9c9ad40c075756ba93b47984461d4ff15d - () https://git.kernel.org/stable/c/88a01e9c9ad40c075756ba93b47984461d4ff15d - Patch
References () https://git.kernel.org/stable/c/9193bdc170cc23fe98aca71d1a63c0bf6e1e853b - () https://git.kernel.org/stable/c/9193bdc170cc23fe98aca71d1a63c0bf6e1e853b - Patch

27 Feb 2025, 18:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416

27 Feb 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 03:15

Updated : 2025-05-02 07:15


NVD link : CVE-2024-54458

Mitre link : CVE-2024-54458

CVE.ORG link : CVE-2024-54458


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free